We just finished setting up ingestion of MS Cloud Defender alerts into our Google SecOps instance.
Using the following docs:
https://cloud.google.com/chronicle/docs/ingestion/default-parsers/ms-defender-cloud-alerts#overview
Alerts are flowing just fine. Next step is to create alerts if any fired. I’ve tried leveraging the Curated detections, but noticed that the event type referenced in the curated detections is different, so they wont fire.
My event type beign ingested are coming
metadata.log_type = "MICROSOFT_DEFENDER_CLOUD_ALERTS"
Looking at the curated detections logic, I see completely different log_type.
metadata.log_type = "MICROSOFT_GRAPH_ALERT"
Whats “microsoft Graph Alert” to start and why are the curated detection for Cloud Defender using this log_type?
How can I edit the curated detections to fix this? I would hate having to deploy all rules on my own.
Any advice?
Thanks in advance.